• Contact Us

    We will get back to you as soon as possible.

  • We do not collect personal information except to the extent you provide that information to use through email, your web browser or through our contact forms. We will not share, sell or otherwise provide non-public information to others without your consent.

SIGN UP FOR OUR NEWSLETTER

  • We do not collect personal information except to the extent you provide that information to use through email, your web browser or through our contact forms. We will not share, sell or otherwise provide non-public information to others without your consent.

Blog

request a quote

Recent Posts

…of Service

…of Service

A few short weekends ago, my wife and I joined a group of brave Freedom fighters who had an incredible church fundraiser in beautiful Puerto Rico.On this trip, we had the opportunity to not only visit many historical and beautiful sites, but also became acquainted and...

Technical Tip – Phishing Email Attack

Technical Tip – Phishing Email Attack

Email Phishing is but one type of email attack individuals and organizations can inadvertently fall prey to. Take a moment to arm yourself, family and employees with some knowledge.  Ensure likewise to proactively verify the appropriate educational and security...

Azure Self Service Password Reset

Azure Self Service Password Reset

Quick call out to businesses using or considering Microsoft's Self Service Password Reset (SSPR). Just to put any questions to reset, this really is a proven, easy, secure and inexpensive method of providing a whole new level-of-service to and for your remote workers...

TLS Remediation – Finally Uncovered

TLS Remediation – Finally Uncovered

Hey guys - me again harping on about TLS. There happens to be a number of incredibly smart men and women out there working diligently to eliminate weak TLS protocols. As an added bonus to this whole effort, this effort will also disable certain weak cryptographic...

Professionalism

Professionalism

Professionalism is relentless dedication towards a task, job, project, cause or even a loved one or group. It wouldn’t necessarily consist of a hairdo, nor the car one drives. Although commonly mistaken, professionalism wouldn't necessarily include politeness nor...

Starving Resumes Left Behind

Starving Resumes Left Behind

A Resume Communicates ability!I wanted to take a few minutes to share a few successful actions and tips for authoring or updating resumes. These tips ought to help better capture the attention of your audience, hiring managers or recruiters.  Additionally, I really...

Your Talent’s Aptitude – Part 1/2

Your Talent’s Aptitude – Part 1/2

In today's workforce and society, finding and then determining aptitude is without a doubt critical for success! Aptitude is an amazing ability.  We are all inherently blessed with potential aptitude. Aptitude isn’t merely a fancy or colorful word.  Aptitude is that...

Separation Of Duties through a key hole

Separation Of Duties through a key hole

A Discussion on Security ImprovementsFor decades, businesses have sloppily adopted and implemented haphazard business practices of over-doing, over-granting IT personnel with unchecked elevated access. This elevated access provides IT personnel with increased...

Security: Separation of Duties & MFA – Part 1

Security: Separation of Duties & MFA – Part 1

Security Brain Dump - Part 1 of 3 From numerous security discussions, below is a rapid brain dump of elements to look out for when implementing separation of duties (SOD) along with multi-factor authentication. When tackling security, a bit of forethought and planning...

Operationalize & Normalize System Patching

Operationalize & Normalize System Patching

Maintaining Patch Levels We're going to discuss system patching.  Sorry for sounding like a broken record & for this long winded 2018 New Years message. Over the past many months, businesses have faced re-prioritized tasks and delayed deliverables, not to mention...

Office 365:  Proper Scoping

Office 365: Proper Scoping

A successful Office 365 migration should not require “learning by the school of hard knocks” or “trial and error”. Such approaches can wind up costing businesses a fortune while they try to get it right. At DTS we know it can be done better and more efficiently and...

Office 365:  Actual Impact

Office 365: Actual Impact

Proactively researching best methods, practices and approach(es) to successfully transition a business to Office 365, while making full use of existing investments, can be an interesting challenge.  This can be compared to a chess match, where the business has an...

Office 365:  Key Decision Points

Office 365: Key Decision Points

A successful implementation of Office 365 begins with proper strategic planning and alignment.  Planning begins with the delineation of the requirements. There are two distinct types of requirements. The first are those which comprise or capture function such as,...

Office 365:  Requirements Gathering

Office 365: Requirements Gathering

Whether located on-premises or in the cloud, today's business relies on data and email collaborative services. Office 365 provides a secure and reliable suite of collaborative services at a lower cost than traditional licensing. Now is the time to plan out...

Mergers & Acquisitions:  Email Services

Mergers & Acquisitions: Email Services

Business mergers and acquisitions are a key component in the future growth and prosperity for all companies involved. That is, if the process is managed efficiently and effectively. Identify Dependencies: In any business model, there is a significant dependence upon...

Merging Email Services is Far More Streamlined Today

Merging Email Services is Far More Streamlined Today

Whether or not both parent and child business entities utilize cloud or on-premises technology for email services, merging the source, or child, environment into the parent can present technical hurdles and challenges. Knowing this path streamlines such initiatives,...

Executive Summary:  Architecting and Engineering

Executive Summary: Architecting and Engineering

If you’re reading this, you are probably looking at transitioning your business’ email service to an online solution, such as Exchange Online. You’ve probably also come to the realization this might not be as simple as sitting back and pressing “Play”. You’re more...

Enable Your Active Directory Recycling Bin

Enable Your Active Directory Recycling Bin

True Story - Avoiding RiskThis past weekend, a medium-sized client contacted us concerning a serious problem. Moments before the call, the admin had unfortunately and inadvertently deleted ALL, YES ALL, Active Directory user objects (excluding service accounts).  If...

Do your emails arrive?

Do your emails arrive?

Take a peek under the hood...In today's digital communication market, there are vast numbers of germane reasons email messages miss their intended target(s). Through a bit of intrepidity, and certainly some investigation, one can increase the likelihood messages will...

Hybrid Deployment

Hybrid Deployment

Good morning!!  Me again with some quick and helpful tips to consider how to manage or deploy cloud solutions. Hybrid Deployment Considerations - possibly a better alternative (more choices, less restrictive) In this day and age, access to data must be...

Automating Archives – Exchange Online

Automating Archives – Exchange Online

Good afternoon, I wanted to take a moment to touch on a hot topic concerning Exchange Online inplace archives, plus provide a simplified method to establish a standard-state across the organization. Most businesses maintain strict and rigorous retention policies on...

Securing Communications – TLS Encryption

Securing Communications – TLS Encryption

Hello - me again. Because there's been such a surge of questions and interest concerning "secure email", I want to take a few moments to capture some relatively important details about this.As more businesses begin leveraging (and certainly requiring) secure...

Email Archiving & Retention – A Bigger Picture

Email Archiving & Retention – A Bigger Picture

I wanted to take a moment to share an interesting acquisition scenario which was skillfully pulled out of the fire.  This happened to be an on premises Exchange to Exchange Online migration. The child entity with several thousand mailboxes and a ton of data was...

LAN Manager (NTLM)

LAN Manager (NTLM)

Being a complicated subject, I thought I'd take a moment to provide some handy visual representation that clearly explains the difference between the levels of NT LAN manager (NTLM) authentication. A fairly old and insecure method of authentication, which computers...